Preface
Chapter 1 Introduction
1.1 Security Trends
1.2 The OSI Security Architecture
1.3 Security Attacks
1.4 Security Services
1.5 Security Mechanisms
1.6 A Model for Internetwork Security
1.7 Internet Standards the Internet Society
1.8 Outline of This Book
1.9 Recommended Reading
1.10 Internet andWeb Resources
1.11 Key Terms, Review Questio, and Problems
PART ONE CRYPTOGRAPHY
Chapter 2 Symmetric Encryption and Message Confidentiality
2.1 Symmetric Encryption Principles
2.2 Symmetric Block Encryption Algorithms
2.3 Stream Ciphe and RC
2.4 Cipher Block Modes of Operation
2.5 Location of Encryption Devices
2.6 Key Distribution
2.7 Recommended Reading andWeb Sites
2.8 Key Terms, Review Questio, and Problems
Chapter 3 Public-Key Cryptography and Message Authentication
3.1 Approaches to Message Authentication
3.2 Secure Hash Functio and HMAC
3.3 Public Key Cryptography Principles
3.4 Public-Key Cryptography Algorithms
3.5 Digital Signatures
3.6 Key Management
3.7 Recommended Reading andWeb Sites
3.8 Key Terms, Review Questio, and Problems
PART TWO NETWORK SECURITY APPLICATIONS
Chapter 4 Authentication Applicatio
4.1 Kerberos
4.2 X.509 Directory Authentication Service
4.3 Public Key Infrastructure
4.4 Recommended Reading and Web Sites
4.4 Key Terms, Review Questio, and Problems
Appendix 4A: Kerberos Encryption Techniques
Chapter 5 Electronic Mail Security
5.1 Pretty Good Privacy (PGP)
5.2 S/MIME
5.3 Recommended Web Sites
5.4 Key Terms, Review Questio, and Problems
Appendix 5A: Data Compression Using ZIP
Appendix 5B: Radix-64 Conveion
Appendix 5C: PGP Random Number Generation
Chapter 6 IP Security
6.1 IP Security Overview
6.2 IP Security Architecture
6.3 Authentication Header
6.4 Encapsulating Security Payload
6.5 Combining Security Associatio
6.6 Key Management
6.7 Recommended Reading andWeb Sites
6.8 Key Terms, Review Questio, and Problems
Appendix 6A: Internetworking and Internet Protocols
Chapter 7 Web Security
7.1 Web Security Requirements
7.2 Secure Sockets Layer (SSL) and Traport Layer Security (TLS)
7.3 Secure Electronic Traaction (SET)
7.4 Recommended Reading and Web Sites
7.5 Key Terms, Review Questio, and Problems
Chapter 8 Network Management Security
8.1 Basic Concepts of SNMP
8.2 SNMPvl Community Facility
8.3 SNMPv
8.4 Recommended Reading and Web Sites
8.5 Key Terms, Review Questio, and Problems
PART THREE SYSTEM SECURITY
Chapter 9 Intrude
9.1 Intrude
9.2 Intrusion Detection
9.3 Password Management
9.4 Recommended Reading and Web Sites
9.5 Key Terms, Review Questio, and Problems
Appendix 9A:The Base-Rate Fallacy
Chapter 10 Malicious Software
10.1 Viruses and Related Threats
10.2 Virus Countermeasures
10.3 Distributed Denial of Service Attacks
10.4 R ecommended Reading andWeb Sites
10.5 Key Terms, Review Questio, and Problems
Chapter 11 Firewalls
11.1 Firewall Design Principles
11.2 Trusted Systems
11.3 Common Criteria for Information Technology Security Evaluation
11.4 Recommended Reading and Web Sites
11.5 KeyTerms, Review Questio,and Problems
APPENDICES
Appendix A Some Aspects of Number Theory
A.1 Prime and Relatively Prime Numbe
A.2 Modular Arithmetic
Appendix B Projects for Teaching Network Security
B.1 Research Projects
B.2 Programming Projects
B.3 Laboratory Exercises
B.4 Writing Assignments
B.5 Reading/Report Assignments
Glossary
References
Index